Ruben Torres
Ruben Torres
Verified email at
Cited by
Cited by
Youtube everywhere: Impact of device and infrastructure synergies on user experience
A Finamore, M Mellia, MM Munafo, R Torres, SG Rao
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
Dissecting video server selection strategies in the YouTube CDN
R Torres, A Finamore, JR Kim, M Mellia, MM Munafo, S Rao
2011 31st International Conference on Distributed Computing Systems, 248-257, 2011
Detecting malicious endpoints using network connectivity and flow information
S Saha, L Liu, R Torres, J Xu, A Nucci
US Patent 8,813,236, 2014
Nazca: Detecting Malware Distribution in Large-Scale Networks.
L Invernizzi, S Miskovic, R Torres, C Kruegel, S Saha, G Vigna, SJ Lee, ...
NDSS 14, 23-26, 2014
Towards self adaptive network traffic classification
A Tongaonkar, R Torres, M Iliofotou, R Keralapura, A Nucci
Computer Communications 56, 35-46, 2015
Detecting malicious http redirections using trees of user browsing activity
H Mekky, R Torres, ZL Zhang, S Saha, A Nucci
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1159-1167, 2014
Litigios por derecho a la salud en tres países de América Latina: revisión sistemática de la literatura
L Reveiz, E Chapman, R Torres, JF Fitzgerald, A Mendoza, M Bolis, ...
Revista Panamericana de Salud Pública 33, 213-222, 2013
Frequency of ambulatory care adverse events in Latin American countries: the AMBEAS/PAHO cohort study
D Montserrat-Capella, M Suárez, L Ortiz, JJ Mira, HG Duarte, L Reveiz, ...
International Journal for Quality in Health Care 27 (1), 52-59, 2015
Detecting malicious HTTP redirections using user browsing activity trees
R Torres, H Mekky, ZL Zhang, S Saha, A Nucci
US Patent 9,531,736, 2016
Detecting suspicious network behaviors based on domain name service failures
P Luo, R Torres, ZL Zhang, S Saha, SJ Lee, A Nucci
US Patent 9,245,121, 2016
DDoS attacks by subverting membership management in P2P systems
X Sun, R Torres, S Rao
2007 3rd IEEE Workshop on Secure Network Protocols, 1-6, 2007
Detecting malware infestations in large-scale networks
L Invernizzi, S Miskovic, R Torres, S Saha, C Kruegel, A Nucci, SJ Lee, ...
US Patent 8,959,643, 2015
Inferring undesirable behavior from P2P traffic analysis
RD Torres, MY Hajjat, SG Rao, M Mellia, MM Munafò
Proceedings of the eleventh international joint conference on Measurement …, 2009
Anatomical, histological and ultraestructural description of the gills and liver of the Tilapia (Oreochromis niloticus)
R Torres, P Gonzalez, S Pena
International Journal of Morphology 28 (3), 703-712, 2010
Right-to-health litigation in three Latin American countries: a systematic literature review/Litigios por derecho a la salud en tres paises de America Latina: revision …
L Reveiz, E Chapman, R Torres, JF Fitzgerald, A Mendoza, M Bolis, ...
Revista Panamericana de Salud Pública 33 (3), 213-223, 2013
Botnet protocol inference in the presence of encrypted traffic
L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
Detecting malicious clients in isp networks using http connectivity graph and flow information
L Liu, S Saha, R Torres, J Xu, PN Tan, A Nucci, M Mellia
2014 IEEE/ACM International Conference on Advances in Social Networks …, 2014
Network application signatures for binary protocols
R Keralapura, R Torres, M Iliofotou, A Tongaonkar, A Nucci
US Patent 8,578,024, 2013
Mitos y realidades de las obras sociales en la Argentina
R Torres
Ediciones Granica SA, 2004
Detecting malicious activities with user‐agent‐based profiles
Y Zhang, H Mekky, ZL Zhang, R Torres, SJ Lee, A Tongaonkar, M Mellia
International Journal of Network Management 25 (5), 306-319, 2015
The system can't perform the operation now. Try again later.
Articles 1–20